Bcrypt Hash Verifier
Verify a password against a bcrypt hash instantly in your browser. Supports $2a$, $2b$, and $2y$ prefixes. Nothing is uploaded.
bcrypt is a password-hashing function designed by Niels Provos and David Mazières in 1999. It embeds a random salt and a cost factor, making brute-force attacks computationally expensive. Unlike MD5 or SHA-256, bcrypt hashes cannot be reversed via rainbow tables. Use it for all password storage. All verification runs entirely in your browser. Neither the password nor the hash is sent to any server.
How to use Bcrypt Hash Verifier
-
Open the Verify tab
Click the 'Verify' tab at the top of the widget — it is the default on this page.
-
Enter the plaintext password
Type or paste the password you want to verify in the password input field.
-
Paste the bcrypt hash
Paste the full bcrypt hash (starting with $2b$, $2a$, or $2y$ followed by the cost factor and 53-character string) into the hash field.
-
Click Verify Hash
Click the 'Verify Hash' button. Wait 1–5 seconds while bcryptjs re-hashes your password with the embedded salt.
-
Read the result
The result shows 'Match' in green if the password is correct, or 'No Match' in red if it is not.
Bcrypt Hash Verifier FAQ
How does bcrypt verification work?
Is this tool safe to use with real passwords?
Are my inputs sent to a server?
Why does verification take so long?
What bcrypt hash formats are supported?
Can bcrypt be reversed or cracked?
What if the hash I paste is invalid?
Why would verification fail for a password I believe is correct?
What is the difference between bcrypt and SHA-256 for passwords?
When should I use this tool vs the Bcrypt Generator?
Background
Verify whether a plaintext password matches a stored bcrypt hash, entirely in your browser using the bcryptjs library.
How bcrypt verification works: A bcrypt hash encodes the random salt used during generation directly in the hash string. The verifier extracts this salt, re-hashes your password with it, and compares the result byte-for-byte against the stored hash. Match or no match — no server required.
Use cases:
- Debug authentication issues: confirm a stored hash matches a known password
- Test that your bcrypt library produces spec-compliant output
- Verify that a password was hashed correctly before storing in a database
- Audit security test fixtures in your CI pipeline
Supported formats: $2b$ (current standard), $2a$ (1999 original),
and $2y$ (PHP variant, equivalent to $2b$).
Verification time: Expect 1–5 seconds at cost factors 10–12. This delay is intentional — bcrypt's slowness is what makes brute-force attacks impractical.
Privacy: All computation runs client-side. Neither the password nor the hash leaves your device at any point.
Related tools
Bcrypt Hash Generator
Generate bcrypt hashes with configurable cost factor (4–31). Auto-salted, rainbow-table resistant, fully browser-based. Recommended for secure password storage.
MD5 Hash Generator
Generate MD5 hashes from text in real time. Instant output, uppercase toggle, 100% browser-based. Not for passwords — use bcrypt instead.
SHA-256 Hash Generator
Generate SHA-256 hashes from text instantly. WebCrypto hardware-accelerated, real-time output. Used in Bitcoin, TLS, and digital signatures. Zero uploads.
MD5 Decrypt — Hash Lookup
Reverse-lookup MD5 hashes via rainbow table databases. Not true decryption — MD5 is one-way. Checks multiple sources for the best match rate.
Password Generator
Generate cryptographically secure passwords with custom length (8–128), character sets, entropy display, and exclude-ambiguous option. Runs in your browser.
Password Breach Checker
Check if a password appeared in known data breaches using k-anonymity. Only the first 5 SHA-1 hash characters are sent — your password never leaves your browser.
Learn more
How Long Does It Take to Crack a Password in 2026?
See real password crack times by length and character set, from 4 to 20 characters, plus the defenses that actually matter.
securityStrong Password Generator: How to Create Uncrackable Passwords in 2026
Generate secure passwords and passphrases with our free tool. Learn what makes a password strong, how crack time estimates work, and best practices for password security.